关联漏洞
介绍
# CVE-2024-4367: Arbitrary JavaScript Execution in PDF.js
## Overview
CVE-2024-4367 is a critical vulnerability in the PDF.js library that allows arbitrary JavaScript execution in a user's browser, leading to Cross-Site Scripting (XSS) attacks. This affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
## Usages
### Node in /app
```bash
npm install
```
```bash
npm start
```
### PoC
- `python3 poc.py <payload>`
- Example: `python3 poc.py "alert(1)"`
### Demo Videos
- [Demo 1 (Firefox)](https://www.youtube.com/watch?v=s4V5fL3AQew)
- [Demo 2 (pdfjs-dist)](https://www.youtube.com/watch?v=dWHtNF5-MKk)
## Mitigation
- Update PDF.js to a version higher than 4.1.392.
- Ensure your Firefox, Firefox ESR, or Thunderbird is up-to-date with the latest security patches.
## Detailed Analysis
For a comprehensive analysis of CVE-2024-4367, [read here](https://masamuneee.github.io/posts/cve-2024-4367/).
## PoC references
- https://github.com/LOURC0D3/CVE-2024-4367-PoC
- https://github.com/s4vvysec/CVE-2024-4367-POC
文件快照
[4.0K] /data/pocs/2ca2ce839549b1f422df974a0c608d4a25448738
├── [4.0K] app
│ ├── [ 331] package.json
│ ├── [4.0K] public
│ │ └── [2.0K] index.html
│ └── [ 522] server.js
├── [4.0K] poc
│ ├── [1.8K] poc.pdf
│ ├── [2.4K] poc.py
│ └── [ 18K] sample.pdf
└── [1.0K] README.md
3 directories, 7 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。